Minor Histories


Book Description

The second volume of writings by Los Angeles artist Mike Kelley, focusing on his own work. What John C. Welchman calls the "blazing network of focused conflations" from which Mike Kelley's styles are generated is on display in all its diversity in this second volume of the artist's writings. The first volume, Foul Perfection, contained thematic essays and writings about other artists; this collection concentrates on Kelley's own work, ranging from texts in "voices" that grew out of scripts for performance pieces to expository critical and autobiographical writings.Minor Histories organizes Kelley's writings into five sections. "Statements" consists of twenty pieces produced between 1984 and 2002 (most of which were written to accompany exhibitions), including "Ajax," which draws on Homer, Colgate- Palmolive, and Longinus to present its eponymous hero; "Some Aesthetic High Points," an exercise in autobiography that counters the standard artist bio included in catalogs and press releases; and a sequence of "creative writings" that use mass cultural tropes in concert with high art mannerisms—approximating in prose the visual styles that characterize Kelley's artwork. "Video Statements and Proposals" are introductions to videos made by Kelley and other artists, including Paul McCarthy and Bob Flanagan and Sheree Rose. "Image-Texts" offers writings that accompany or are part of artworks and installations. This section includes "A Stopgap Measure," Kelley's zestful millennial essay in social satire, and "Meet John Doe," a collage of appropriated texts. "Architecture" features an discussion of Kelley's Educational Complex (1995) and an interview in which he reflects on the role of architecture in his work. Finally, "Ufology" considers the aesthetics and sexuality of space as manifested by UFO sightings and abduction scenarios.










Mennonite Arts


Book Description

The rich and diverse arts practiced by the distinctive Mennonite communities in Europe, Pennsylvania, and Canada over a 300-year period are presented. A host of newly recognized Mennonite artisans of traditional quilts, furniture, wood carvings, and fraktur, are introduced, and many are displayed here in the hundreds of color images.







The Abell Family of America


Book Description




The Jews of Windsor, 1790-1990


Book Description

Beginning with the first Jewish settler, Moses David, the important role that Windsor Jews played in the development of Ontario's south is mirrored in this 200-year chronicle. the founding pioneer families transformed their Eastern European shtetl into a North American settlement; many individuals were involved in establishing synagogues, schools, and an organized communal structure in spite of divergent religious, political, and economic interests. Modernity and the growing influences of Zionism and Conservative/Reform Judaism challenged the traditional and leftist leanings of the community's founders. From the outset, Jews were represented in city council, actively involved in communal organizations, and appointed to judicial posts. While its Jewish population was small, Windsor boasted Canada's first Jewish Cabinet members, provincially and federally, in David Croll and Herb Gray. As the new millennium approached, jews faced shrinking numbers, forcing major consolidations in order to ensure their survival.







Building Internet Firewalls


Book Description

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.